Empire is an open source, cross-platform remote administration and post-exploitation framework that is publicly available on GitHub. While the tool itself is primarily written in Python, the post-exploitation agents are written in pure PowerShell for Windows and Python for Linux/macOS. Empire was one of five tools singled out by a joint report on public hacking tools being widely used by adversaries.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Empire can use WMI to deliver a payload to a remote host.[2] |
|
| Enterprise | T1557 | .001 | 中间人攻击: LLMNR/NBT-NS Poisoning and SMB Relay |
Empire can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks.[2][4] |
| Enterprise | T1546 | .008 | 事件触发执行: Accessibility Features |
Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.[2] |
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome.[2] |
| Enterprise | T1550 | .002 | 使用备用认证材料: Pass the Hash | |
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Empire can utilize built-in modules to modify service binaries and restore them to their original state.[2] |
| Enterprise | T1136 | .001 | 创建账户: Local Account |
Empire has a module for creating a local user if permissions allow.[2] |
| .002 | 创建账户: Domain Account |
Empire has a module for creating a new domain user if permissions allow.[2] |
||
| Enterprise | T1115 | 剪贴板数据 |
Empire can harvest clipboard data on both Windows and macOS systems.[2] |
|
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography | |
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking |
Empire contains modules that can discover and exploit various DLL hijacking opportunities.[2] |
| .004 | 劫持执行流: Dylib Hijacking |
Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.[2] |
||
| .007 | 劫持执行流: Path Interception by PATH Environment Variable |
Empire contains modules that can discover and exploit path interception opportunities in the PATH environment variable.[2] |
||
| .008 | 劫持执行流: Path Interception by Search Order Hijacking |
Empire contains modules that can discover and exploit search order hijacking vulnerabilities.[2] |
||
| .009 | 劫持执行流: Path Interception by Unquoted Path |
Empire contains modules that can discover and exploit unquoted path vulnerabilities.[2] |
||
| Enterprise | T1127 | .001 | 可信开发者工具代理执行: MSBuild |
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.[2] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Empire can modify the registry run keys |
| .005 | 启动或登录自动启动执行: Security Support Provider |
Empire can enumerate Security Support Providers (SSPs) as well as utilize PowerSploit's |
||
| .009 | 启动或登录自动启动执行: Shortcut Modification |
Empire can persist by modifying a .LNK file to include a backdoor.[2] |
||
| Enterprise | T1059 | 命令与脚本解释器 |
Empire uses a command-line interface to interact with systems.[2] |
|
| .001 | PowerShell |
Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the |
||
| .003 | Windows Command Shell | |||
| Enterprise | T1482 | 域信任发现 | ||
| Enterprise | T1484 | .001 | 域或租户策略修改: Group Policy Modification |
Empire can use |
| Enterprise | T1113 | 屏幕捕获 |
Empire is capable of capturing screenshots on Windows and macOS systems.[2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Empire can conduct command and control over protocols like HTTP and HTTPS.[2] |
| Enterprise | T1560 | 归档收集数据 | ||
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Empire contains an implementation of Mimikatz to gather credentials from memory.[2] |
| Enterprise | T1083 | 文件和目录发现 |
Empire includes various modules for finding files of interest on hosts and network shares.[2] |
|
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
Empire can use various modules to search for files containing passwords.[2] |
| .004 | 未加密凭证: Private Keys |
Empire can use modules like |
||
| Enterprise | T1106 | 本机API |
Empire contains a variety of enumeration modules that have an option to use API calls to carry out tasks.[2] |
|
| Enterprise | T1068 | 权限提升漏洞利用 |
Empire can exploit vulnerabilities such as MS16-032 and MS16-135.[2] |
|
| Enterprise | T1217 | 浏览器信息发现 |
Empire has the ability to gather browser data such as bookmarks and visited sites.[2] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
Empire has the ability to obfuscate commands using |
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
Empire includes various modules to attempt to bypass UAC for escalation of privileges.[2] |
| Enterprise | T1114 | .001 | 电子邮件收集: Local Email Collection |
Empire has the ability to collect emails on a target system.[2] |
| Enterprise | T1070 | .006 | 移除指标: Timestomp |
Empire can timestomp any files or payloads placed on a target machine to help them blend in.[2] |
| Enterprise | T1558 | .001 | 窃取或伪造Kerberos票据: Golden Ticket |
Empire can leverage its implementation of Mimikatz to obtain and use golden tickets.[2] |
| .002 | 窃取或伪造Kerberos票据: Silver Ticket |
Empire can leverage its implementation of Mimikatz to obtain and use silver tickets.[2] |
||
| .003 | 窃取或伪造Kerberos票据: Kerberoasting |
Empire uses PowerSploit's |
||
| Enterprise | T1082 | 系统信息发现 |
Empire can enumerate host system information like OS, architecture, domain name, applied patches, and more.[2][5] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Empire can use PsExec to execute a payload on a remote host.[2] |
| Enterprise | T1049 | 系统网络连接发现 |
Empire can enumerate the current network connections of a host.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Empire can acquire network configuration information like DNS servers, public IP, and network proxies used by a host.[2][5] |
|
| Enterprise | T1615 | 组策略发现 |
Empire includes various modules for enumerating Group Policy.[2] |
|
| Enterprise | T1135 | 网络共享发现 | ||
| Enterprise | T1040 | 网络嗅探 |
Empire can be used to conduct packet captures on target hosts.[2] |
|
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication | |
| Enterprise | T1046 | 网络服务发现 | ||
| Enterprise | T1119 | 自动化收集 |
Empire can automatically gather the username, domain name, machine name, and other information from a compromised system.[5] |
|
| Enterprise | T1020 | 自动化渗出 |
Empire has the ability to automatically send collected data back to the threat actors' C2.[5] |
|
| Enterprise | T1125 | 视频捕获 |
Empire can capture webcam data on Windows and macOS systems.[2] |
|
| Enterprise | T1134 | 访问令牌操控 |
Empire can use PowerSploit's |
|
| .002 | Create Process with Token | |||
| .005 | SID-History Injection |
Empire can add a SID-History to a user if on a domain controller.[2] |
||
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Empire can acquire local and domain user account information.[2] |
| .002 | 账号发现: Domain Account |
Empire can acquire local and domain user account information.[2][6] |
||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery | |
| Enterprise | T1105 | 输入工具传输 |
Empire can upload and download to and from a victim machine.[2] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
Empire includes keylogging capabilities for Windows, Linux, and macOS systems.[2] |
| .004 | 输入捕获: Credential API Hooking |
Empire contains some modules that leverage API hooking to carry out tasks, such as netripper.[2] |
||
| Enterprise | T1057 | 进程发现 |
Empire can find information about processes running on local and remote systems.[2][5] |
|
| Enterprise | T1055 | 进程注入 |
Empire contains multiple modules for injecting into processes, such as |
|
| Enterprise | T1021 | .003 | 远程服务: Distributed Component Object Model |
Empire can utilize |
| .004 | 远程服务: SSH |
Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection.[2] |
||
| Enterprise | T1210 | 远程服务漏洞利用 |
Empire has a limited number of built-in modules for exploiting remote SMB, JBoss, and Jenkins servers.[2] |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Empire can send data gathered from a target through the command and control channel.[2][5] |
|
| Enterprise | T1567 | .001 | 通过网络服务渗出: Exfiltration to Code Repository | |
| .002 | 通过网络服务渗出: Exfiltration to Cloud Storage | |||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Empire has modules to interact with the Windows task scheduler.[2] |
| ID | Name | References |
|---|---|---|
| G0091 | Silence | |
| G0051 | FIN10 | |
| G0010 | Turla | |
| G0090 | WIRTE | |
| G0034 | Sandworm Team |
Sandworm Team has used multiple publicly available tools during operations, such as Empire.[12] |
| G1040 | Play | |
| G0065 | Leviathan | |
| G1016 | FIN13 | |
| G0073 | APT19 | |
| G0119 | Indrik Spider | |
| G0052 | CopyKittens | |
| G1001 | HEXANE | |
| G0096 | APT41 | |
| G0140 | LazyScripter | |
| G0069 | MuddyWater | |
| G0064 | APT33 | |
| G0102 | Wizard Spider |
| ID | Name | Description |
|---|---|---|
| C0001 | Frankenstein |
During Frankenstein the threat actors used Empire for discovery.[5] |